Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching: data security





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
US-9,865,113 Apparatus, system and method for dynamic identification and key management for vehicle access
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,865,112 Apparatus, system and method for dynamic identification for vehicle access
A system for providing dynamic access to a vehicle via a plurality of devices. A device and/or a server of an authentication network stored fob data relating to...
US-9,864,994 Terminal for magnetic secure transmission
Devices, systems, and methods for securely converting a user's existing static payment card data into dynamic card data that can be authenticated by card...
US-9,864,978 Method and apparatus for enabling content to be shared among multiple devices in a secure environment
A Master device (e.g., a SIM card) is configured with information regarding one or more Slave devices (e.g., SIM cards) that are associated with the Master...
US-9,864,971 Secure self-checkout station
A self-checkout system includes a cabinet having a doorway and a vending space. The system includes a secure door enclosing the vending space. The system...
US-9,864,879 Secure subsystem
An apparatus for performing secure operations with a dedicated secure processor is described in one embodiment. The apparatus includes security firmware...
US-9,864,866 Dynamically configurable online data update system
A data object update system provides a flexible framework that can be used to upgrade, renew, replace or supplement data objects that are provisioned in a large...
US-9,864,703 Cache memory having enhanced performance and security features
A cache memory having enhanced performance and security feature is provided. The cache memory includes a data array storing a plurality of data elements, a tag...
US-9,864,687 Cache coherent system including master-side filter and data processing system including same
An application processor is provided. The application processor includes a cache coherent interconnect, a first master device connected to the cache coherent...
US-9,864,655 Methods and apparatus for mobile computing device security in testing facilities
Methods and apparatus are provided for providing testing as a service. A loading computing device can receive a request to restore a testing computing device to...
US-9,864,629 Real-time code and data protection via CPU transactional memory suppport
A technique allows for memory bounds checking for dynamically generated code by using transactional memory support in a processor. The memory bounds checking...
US-9,864,599 Firmware update method in two-chip solution for secure terminal
A firmware update method in a two-chip solution for a secure terminal. The method comprises secure firmware update and application firmware update. The secure...
US-9,864,372 Automated drone systems
An automated drone security system for surveilling a location includes one or more drones with onboard sensors and an imaging device for measuring surveillance...
US-9,862,488 Location verification and secure no-fly logic for unmanned aerial vehicles
Certain embodiments herein relate to location verification for autonomous unmanned aerial vehicles (also referred to as "drones"). In some embodiments, an...
US-9,860,965 Cloud connected lighting system
A cloud connected lighting system may include a wireless lighting network of coordinated lighting devices and a bridge to provide connectivity to external...
US-9,860,796 Secure WiFi using predictive analytics
Aspects automatically direct data requests from a specific application of a mobile programmable device to a designated WiFi network pathway without interaction...
US-9,860,747 System and method for cloud synchronizing known networks
A system and method synchronizes network data for a device registered to a user. The network data includes a list of a plurality of known wireless networks and...
US-9,860,718 Secure broadcast beacon communications
Using various embodiments, methods and systems for secure Bluetooth Low Energy communications, in an unconnected state, are described herein. In one embodiment,...
US-9,860,487 Video conference data generation
In one example embodiment, a method performed by a server may include: receiving user videos from a plurality of devices; generating conference video data that...
US-9,860,382 Systems and methods for predictive personalization and intelligent routing
Systems and methods for intelligently routing a member of an organization to a single point-of-contact within an optimized, secure network to address all the...
US-9,860,269 Managing data traffic in the presence of a sensitive site
Website security may be managed based on known site attributes and placing limits on communication outside a site. One example may include at least one of...
US-9,860,261 System for analyzing and maintaining data security in backup data and method thereof
A computer-implemented method and system for analyzing and maintaining data security in backup data, comprising of: accessing backup data of file systems...
US-9,860,257 Anomaly detection and threat prediction through combined power and network analytics
A network device communicates network traffic in one or more network flows via a plurality of ports. Each port is connected to a corresponding computing device....
US-9,860,250 Systems and methods for use in indexing applications based on security standards
Systems and methods are provided for assigning scores to target applications, based on one or more security standards, whereby the scores are indicative of the...
US-9,860,240 Multi-ring encryption approach to securing a payload using hardware modules
Disclosed are systems and methods of employing a multi-ring encryption approach to secure a data payload. Each ring of encryption may be encrypted from a key...
US-9,860,224 Systems and methods for secured entry of user authentication data
Techniques for improving security of transactions requesting user authentication data entry via mobile devices are described herein. The mobile device is...
US-9,860,221 Internet of things group formation using a key-based join protocol
Systems and methods may provide for determining a first key associated with a first group and determining a first resource exposure policy for the device with...
US-9,860,220 Methods and devices having a key distributor function for improving the speed and quality of a handover
A key distributor node for a network includes a memory device with at least one first key, at least one data communication device that can exchange data with...
US-9,860,218 Information processing terminal, information processing method, and information processing system
A system software unit performs a first authentication operation with an external device using a first key that is registered in advance. A secure software unit...
US-9,860,212 Filtering hidden data embedded in media files
Systems and methods for filtering unsafe content by a network security device are provided. According to one embodiment, a network security device captures...
US-9,860,211 Data leak protection
Methods and systems for Data Leak Prevention (DLP) in an enterprise network are provided. According to one embodiment, a network security device maintains a...
US-9,860,209 Stateful connection processing in a security device cluster
A method operable in a security device cluster having a plurality of security devices each configured to receive respective data flows. The method includes...
US-9,860,179 Data-connection aggregation
A method for security and/or automation systems is disclosed. The method may include identifying data being transmitted over a wired data-connection and parsing...
US-9,860,057 Diffie-Hellman key agreement using an M-of-N threshold scheme
A data processing system (DPS) supports exchange of digital keys. The DPS comprises a communication module which, when executed by the DPS, is operable to...
US-9,860,055 Flexible architecture for processing of large numbers and method therefor
A method of implementing large number multiplication and exponentiation is provided upon a general purpose microprocessor. These large number multiplication and...
US-9,860,013 Time division multiplexed orbital angular momentum based communication
Optical signals with different orbital angular momentum (OAM) modes are used to multiplex data directed to different receiver together using time division...
US-9,859,919 System and method for data compression
The transmission of broadcast data, such as financial data and news feeds, is accelerated over a communication channel using data compression and decompression...
US-9,858,423 Application modification based on a security vulnerability
In some examples, a method includes inserting monitoring instructions to be executed with a set of conditional operations and data type operations in an...
US-9,858,422 Securely booting a computer from a user trusted device
System and computer program product for allowing a computer to boot from a user trusted device. The computer comprises a long-term data storage device storing...
US-9,858,279 Method and system for applying data retention policies in a computing platform
Systems and methods for a multitenant computing platform. Original data is generated through operation of a computing platform system on behalf of an account of...
US-9,855,106 System and methods for positioning bone cut guide
Systems and methods for positioning a cut guide using navigation-based techniques are discussed. For example, a system for use in an orthopedic surgery on a...
US-9,854,482 Controlling a delivery of voice communications over a cellular data network or a wireless network based on...
A method, system and computer program product for controlling the delivery of voice communications. A profile is created for the user of a mobile device that...
US-9,854,437 Apparatus, system and method for exchanging encrypted communications with an eye-mountable device
Techniques and mechanisms for exchanging encrypted communications wirelessly with an accommodation-capable eye-mountable device (EMD). In an embodiment, a...
US-9,854,330 Relevancy improvement through targeting of information based on data gathered from a networked device...
A method, apparatus, and system related to relevancy improvement through targeting of information based on data gathered from a television associated with a...
US-9,854,289 Secure multimedia transfer system
A method and apparatus for secure multimedia transfer provides an encrypted data transfer system that makes transferring multimedia content from a client to any...
US-9,854,142 Security door for electronic communication devices
A security door (100) for a communication device used to record and store or transmit visual data, the communication device having a lens (40) for an integrated...
US-9,854,122 Image forming apparatus, data management method, and storage medium
An image forming apparatus includes a state management unit that shifts an authentication state from a non-login state to a login state, a storage unit that...
US-9,854,057 Network data collection and response system
Embodiments include a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device...
US-9,853,992 Cloud service usage risk analysis based on user location
A system and method for filtering detected anomalies in cloud service usage activities associated with an enterprise uses a trusted location analysis to filter...
US-9,853,987 Method, apparatus and system for realizing security detection in heterogeneous network
Provided are a method, apparatus and system for realizing security detection in a heterogeneous network. UE establishes cross-Evolved NodeB (eNB)...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.